CVE-2021-21986Missing Authentication for Critical Function in Vmware Cloud Foundation

Severity
9.8CRITICALNVD
EPSS
1.5%
top 18.88%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 26
Latest updateMay 24

Description

The vSphere Client (HTML5) contains a vulnerability in a vSphere authentication mechanism for the Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Cloud Director Availability plug-ins. A malicious actor with network access to port 443 on vCenter Server may perform actions allowed by the impacted plug-ins without authentication.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

NVDvmware/vcenter_server6.5, 6.7, 7.0+2
NVDvmware/cloud_foundation3.03.10.2.1+1

🔴Vulnerability Details

2
GHSA
GHSA-6qhw-394j-xwvg: The vSphere Client (HTML5) contains a vulnerability in a vSphere authentication mechanism for the Virtual SAN Health Check, Site Recovery, vSphere Lif2022-05-24
CVEList
CVE-2021-21986: The vSphere Client (HTML5) contains a vulnerability in a vSphere authentication mechanism for the Virtual SAN Health Check, Site Recovery, vSphere Lif2021-05-26

📋Vendor Advisories

1
VMware
VMware vCenter Server updates address remote code execution and authentication vulnerabilities (CVE-2021-21985, CVE-2021-21986)2021-05-25
CVE-2021-21986 — Vmware Cloud Foundation vulnerability | cvebase